Expanding your at-home workforce can have a major impact on network infrastructure, security, and corporate culture. Progent has two decades of background assisting small and mid-size businesses to plan, deploy, optimize, administer, and troubleshoot networks that support remote workers. Progent can assist your business to select the appropriate tools and follow best practices in building and maintaining a secure virtualized environment that promotes collaboration and delivers maximum value.
Progent offers remote IT services that range from on-demand support for guiding you over occasional technical roadblocks to full project management for implementing strategic initiatives.
Cybersecurity for Your At-home Workforce
At-home workers commonly use their own computing devices and often work in a physically unsecured environment. This situation multiplies the vulnerability to cyber attacks and calls for judicious deployment of firewalls, remote endpoint monitoring, and the creation of policies based on best practices. Progent's veteran team of certified cybersecurity experts can help you design, implement and manage a compliant security solution that protects critical information assets in networks that incorporate an at-home workforce.
Firewalls allow you to build a secure network that can be safely accessed by local users as well as by at-home workers, mobile employees, vendors, customers, partners, and the public. Modern firewall appliances allow you to assign and manage different access rights to various classes of users and to expand your network and enhance your security as your business evolves and as network attacks become increasingly sophisticated. Progent supports firewall appliances from all major vendors including Cisco, Palo Alto Networks, Check Point, WatchGuard, Juniper, SonicWall, and Fortinet. To learn about Progent's firewall configuration services, see firewall integration consulting.
Remote Endpoint Monitoring makes it possible to track the various devices used by at-home workers and either block or identify and mitigate cyber attacks such as ransomware. With ProSight Active Security Monitoring (ASM) services, a lightweight software agent is installed on each protected endpoint, watching all activity and using state-of-the-art behavioral threat analysis and full execution context to identify new attacks at inception. When an attack is discovered, ProSight ASM immediately disconnects the targeted device from the network to contain the threat. Because the ProSight ASM agent is autonomous, endpoint devices stay protected even when they are not connected to the Internet. Learn more about ProSight ASM remote endpoint monitoring for at-home workers.
Progent's Duo MFA managed services incorporate Cisco's Duo cloud technology to protect against compromised passwords through the use of two-factor authentication (2FA). Duo enables single-tap identity verification with Apple iOS, Google Android and other out-of-band personal devices. With Duo 2FA, when you sign into a secured application and enter your password you are asked to confirm who you are via a device that only you possess and that uses a different ("out-of-band") network channel. A broad assortment of out-of-band devices can be used as this second means of ID authentication including an iPhone, an Android phone, a smart watch, a hardware or software token, a landline phone, etc. You can register multiple verification devices. For more information about ProSight Duo two-factor identity validation authentication services, visit Cisco Duo two-factor authentication (2FA) services for at-home workers.
Security Audits can assess the vulnerability of your information system to all classes of external and internal security threats for a network environment that incorporates an at-home workforce. Progent can deploy remote, automated security analysis software for quickly and economically uncovering a wide variety of technical security gaps that can be detected via the Internet. Progent's security audit consulting services, which can be provided by security professionals with advanced certifications such as CISA, CISM, CISSP, ISSAP, and GIAC, can help your business evaluate your procedures, operations, and governance policies and assess your IT infrastructure to enable you to design the highest level of security for your at-home workers.
Download White Paper: Securing a Work-From-Home (WFH) Environment
To view or download a white paper describing critical areas to focus on for securing a network that includes work-from-home staff, click:
Securing a Work-From-Home (WFH) Environment} White Paper. (PDF - 2.4 MB)
Contact Progent for Remote Workforce Expertise
To find out more about how Progent can help you create an at-home workforce solution, phone 1-800-993-9400 or visit Contact Progent.